Lecture Notes in Computer Science 2828 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Size: px
Start display at page:

Download "Lecture Notes in Computer Science 2828 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen"

Transcription

1 Lecture Notes in Computer Science 2828 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

2 3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo

3 Antonio Lioy Daniele Mazzocchi (Eds.) Communications and Multimedia Security Advanced Techniques for Network and Data Protection 7th IFIP-TC6 TC11 International Conference, CMS 2003 Torino, Italy, October 2-3, 2003 Proceedings 13

4 Series Editors Gerhard Goos, Karlsruhe University, Germany Juris Hartmanis, Cornell University, NY, USA Jan van Leeuwen, Utrecht University, The Netherlands Volume Editors Antonio Lioy Politecnico di Torino Dip. di Automatica e Informatica corso Duca degli Abruzzi, 24, Torino, Italy lioy@polito.it Daniele Mazzocchi Istituto Superiore Mario Boella corso Trento, 21, Torino, Italy mazzocchi@ismb.it Cataloging-in-Publication Data applied for A catalog record for this book is available from the Library of Congress. Bibliographic information published by Die Deutsche Bibliothek Die Deutsche Bibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data is available in the Internet at < CR Subject Classification (1998): C.2, E.3, D.4.6, H.5.1, K.4.1, K.6.5, H.4 ISSN ISBN Springer-Verlag Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer-Verlag Berlin Heidelberg New York a member of BertelsmannSpringer Science+Business Media GmbH IFIP International Federation for Information Processing, Hofstraße 3, A-2361 Laxenburg, Austria 2003 Printed in Germany Typesetting: Camera-ready by author, data conversion by PTP-Berlin GmbH Printed on acid-free paper SPIN: /

5 Preface The Communications and Multimedia Security conference (CMS 2003) was organized in Torino, Italy, on October 2-3, CMS 2003 was the seventh IFIP working conference on communications and multimedia security since Research issues and practical experiences were the topics of interest, with a special focus on the security of advanced technologies, such as wireless and multimedia communications. The book Advanced Communications and Multimedia Security contains the 21 articles that were selected by the conference program committee for presentation at CMS The articles address new ideas and experimental evaluation in several fields related to communications and multimedia security, such as cryptography, network security, multimedia data protection, application security, trust management and user privacy. We think that they will be of interest not only to the conference attendees but also to the general public of researchers in the security field. We wish to thank all the participants, organizers, and contributors of the CMS 2003 conference for having made it a success. October 2003 Antonio Lioy General Chair of CMS 2003 Daniele Mazzocchi Program Chair of CMS 2003

6 VI Organization CMS 2003 was organized by the TORSEC Computer and Network Security Group of the Dipartimento di Automatica ed Informatica at the Politecnico di Torino, in cooperation with the Istituto Superiore Mario Boella. Conference Committee General Chair: Program Chair: Organizing Chair: Antonio Lioy (Politecnico di Torino, Italy) Daniele Mazzocchi (Istituto Superiore Mario Boella, Italy) Andrea S. Atzeni (Politecnico di Torino, Italy) Program Committee F. Bergadano, Università di Torino E. Bertino, Università di Milano L. Breveglieri, Politecnico di Milano A. Casaca, INESC, chairman IFIP TC6 M. Cremonini, Università di Milano Y. Deswarte, LAAS-CNRS M. G. Fugini, Politecnico di Milano S. Furnell, University of Plymouth R. Grimm, Technische Universität Ilmenau B. Jerman-Blažič, Institut Jožef Stefan S. Kent, BBN T. Klobučar, Institut Jožef Stefan A. Lioy, Politecnico di Torino P. Lipp, IAIK J. Lopez, Universidad de Málaga F. Maino, CISCO D. Mazzocchi, ISMB S. Muftic, KTH F. Piessens, Katholieke Universiteit Leuven P. A. Samarati, Università di Milano A. F. G. Skarmeta, Universidad de Murcia L. Strous, De Nederlandsche Bank, chairman IFIP TC11 G. Tsudik, University of California at Irvine

7 Organization CMS 2003 was organized by the TORSEC Computer and Network Security Group of the Dipartimento di Automatica ed Informatica at the Politecnico di Torino, in cooperation with the Istituto Superiore Mario Boella. Conference Committee General Chair: Program Chair: Organizing Chair: Antonio Lioy (Politecnico di Torino, Italy) Daniele Mazzocchi (Istituto Superiore Mario Boella, Italy) Andrea S. Atzeni (Politecnico di Torino, Italy) Program Committee F. Bergadano, Università di Torino E. Bertino, Università di Milano L. Breveglieri, Politecnico di Milano A. Casaca, INESC, chairman IFIP TC6 M. Cremonini, Università di Milano Y. Deswarte, LAAS-CNRS M. G. Fugini, Politecnico di Milano S. Furnell, University of Plymouth R. Grimm, Technische Universität Ilmenau B. Jerman-Blažič, Institut Jožef Stefan S. Kent, BBN T. Klobučar, Institut Jožef Stefan A. Lioy, Politecnico di Torino P. Lipp, IAIK J. Lopez, Universidad de Málaga F. Maino, CISCO D. Mazzocchi, ISMB S. Muftic, KTH F. Piessens, Katholieke Universiteit Leuven P. A. Samarati, Università di Milano A. F. G. Skarmeta, Universidad de Murcia L. Strous, De Nederlandsche Bank, chairman IFIP TC11 G. Tsudik, University of California at Irvine

8 Table of Contents Cryptography Computation of Cryptographic Keys from Face Biometrics... 1 Alwyn Goh, David C.L. Ngo AUTHMAC DH: A New Protocol for Authentication and Key Distribution Heba K. Aslan Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection Alwyn Goh, David C.L. Ngo Network Security Securing the Border Gateway Protocol: A Status Update Stephen T. Kent Towards an IPv6-Based Security Framework for Distributed Storage Resources Alessandro Bassi, Julien Laganier Operational Characteristics of an Automated Intrusion Response System Maria Papadaki, Steven Furnell, Benn Lines, Paul Reynolds Mobile and Wireless Network Security A Secure Multimedia System in Emerging Wireless Home Networks Nut Taesombut, Richard Huang, Venkat P. Rangan Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji A Security Scheme for Mobile Agent Platforms in Large-Scale Systems Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro Trust and Privacy Privacy and Trust in Distributed Networks Thomas Rössler, Arno Hollosi

9 VIII Table of Contents Extending the SDSI / SPKI Model through Federation Webs Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero Trust-X : An XML Framework for Trust Negotiations Elisa Bertino, Elena Ferrari, Anna C. Squicciarini Application Security How to Specify Security Services: A Practical Approach Javier Lopez, Juan J. Ortega, Jose Vivas, Jose M. Troya Application Level Smart Card Support through Networked Mobile Devices Pierpaolo Baglietto, Francesco Moggia, Nicola Zingirian, Massimo Maresca Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage Alwyn Goh, Kuan W. Yip, David C.L. Ngo Multimedia Security Selective Encryption of the JPEG2000 Bitstream Roland Norcen, Andreas Uhl Robust Spatial Data Hiding for Color Images Xiaoqiang Li, Xiangyang Xue, Wei Li Watermark Security via Secret Wavelet Packet Subband Structures Werner Dietl, Andreas Uhl A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression David Megías, Jordi Herrera-Joancomartí, Julià Minguillón Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs Alwyn Goh, G.S. Poh, David C.L. Ngo Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization Bubi G. Flepp-Stars, Herbert Stögner, Andreas Uhl Author Index

Lecture Notes in Computer Science 5161

Lecture Notes in Computer Science 5161 Lecture Notes in Computer Science 5161 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Java and the Java Virtual Machine

Java and the Java Virtual Machine Java and the Java Virtual Machine Springer Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Robert F. SHirk Joachim Schmid Egon Borger Java and the Java Virtual Machine

More information

Understanding Competitive Advantage

Understanding Competitive Advantage Understanding Competitive Advantage Fredrik Nilsson Birger Rapp Understanding Competitive Advantage The Importance of Strategic Congruence and Integrated Control With 44 Figures 4y Springer Professor Dr.

More information

Lecture Notes in Computer Science

Lecture Notes in Computer Science Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen 1267 Advisory Board: W. Brauer D. Gries J. Stoer Springer Berlin Heidelberg New York Barcelona Budapest Hong Kong London

More information

The Banks and the Italian Economy

The Banks and the Italian Economy The Banks and the Italian Economy Damiano Bruno Silipo The Banks and the Italian Economy Physica Verlag A Springer Company Editor Professor Damiano Bruno Silipo Dipartimento di Economia e Statistica Università

More information

Lecture Notes in Computer Science 3161

Lecture Notes in Computer Science 3161 Lecture Notes in Computer Science 3161 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Spatial Data on the Web

Spatial Data on the Web Spatial Data on the Web Alberto B elussi B arbara Catania Eliseo Clementini Elena F errari (Eds.) Spatial Data on the Web Modeling and Management With 111 F igures 123 Editors Alberto Belussi University

More information

Springer-Verlag Berlin Heidelberg GmbH

Springer-Verlag Berlin Heidelberg GmbH Information Systems Outsourcing Springer-Verlag Berlin Heidelberg GmbH Rudy Hirschheim Armin Heinzl. Jens Dibbern Editors Information Systems Outsourcing Enduring Themes, Emergent Patterns and Future Directions

More information

Lecture Notes in Computer Science 3422

Lecture Notes in Computer Science 3422 Lecture Notes in Computer Science 3422 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Design of Flexible Production Systems

Design of Flexible Production Systems Design of Flexible Production Systems Tullio Tolio (Ed.) Design of Flexible Production Systems Methodologies and Tools 13 Professor Tullio Tolio Politecnico di Milano Dipartimento di Meccanica Via La Masa

More information

A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS

A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen DistriNet Research Group, Katholieke Universiteit

More information

International Series on Consumer Science

International Series on Consumer Science International Series on Consumer Science For further volumes: http://www.springer.com/series/8358 Tsan-Ming Choi Editor Fashion Branding and Consumer Behaviors Scientific Models 1 3 Editor Tsan-Ming Choi

More information

How To Write An Fpa Programmable Gate Array

How To Write An Fpa Programmable Gate Array Reconfigurable Field Programmable Gate Arrays for Mission-Critical Applications Niccolò Battezzati Luca Sterpone Massimo Violante Reconfigurable Field Programmable Gate Arrays for Mission-Critical Applications

More information

Automated Firewall Analytics

Automated Firewall Analytics Automated Firewall Analytics Ehab Al-Shaer Automated Firewall Analytics Design, Configuration and Optimization 123 Ehab Al-Shaer University of North Carolina Charlotte Charlotte, NC, USA ISBN 978-3-319-10370-9

More information

Ammonia. Catalysis and Manufacture. Springer-Verlag. Berlin Heidelberg New York London Paris Tokyo Hong Kong Barcelona Budapest

Ammonia. Catalysis and Manufacture. Springer-Verlag. Berlin Heidelberg New York London Paris Tokyo Hong Kong Barcelona Budapest Ammonia Catalysis and Manufacture With contributions by K. Aika, L. 1. Christiansen, I. Dybkjaer, 1. B. Hansen, P. E. H0jlund Nielsen, A. Nielsen, P. Stoltze, K. Tamaru With 68 Figures and 23 Tables Springer-Verlag

More information

Security in Information Systems

Security in Information Systems David G. Rosado Carlos Blanco and Jan Jürjens (Eds.) Security in Information Systems Proceedings of the 9th International Workshop on Security in Information Systems WOSIS 2012 In conjunction with ICEIS

More information

Oral and Cranial Implants

Oral and Cranial Implants Oral and Cranial Implants Hugh Devlin Ichiro Nishimura Editors Oral and Cranial Implants Recent Research Developments Editors Hugh Devlin School of Dentistry University of Manchester Manchester United

More information

Spatial Inequalities

Spatial Inequalities Spatial Inequalities GeoJournal Library Volume 110 Managing Editor: Daniel Z. Sui, Columbus, Ohio, USA Founding Series Editor: Wolf Tietze, Helmstedt, Germany Editorial Board: Paul Claval, France Yehuda

More information

Ding-Zhu Du Editors. Network Security

Ding-Zhu Du Editors. Network Security Network Security Scott C.-H. Huang Ding-Zhu Du Editors David MacCallum Network Security 123 Editors Scott C.-H. Huang Department of Computer Science City University of Hong Kong Tat Chee Avenue 83 Hong

More information

Lecture Notes in Computer Science 7850

Lecture Notes in Computer Science 7850 Lecture Notes in Computer Science 7850 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,

More information

Human Rights in European Criminal Law

Human Rights in European Criminal Law Human Rights in European Criminal Law ThiS is a FM Blank Page Stefano Ruggeri Editor Human Rights in European Criminal Law New Developments in European Legislation and Case Law after the Lisbon Treaty

More information

Lasers in Restorative Dentistry

Lasers in Restorative Dentistry Lasers in Restorative Dentistry Giovanni Olivi Matteo Olivi Editors Lasers in Restorative Dentistry A Practical Guide Editors Giovanni Olivi Rome Italy Matteo Olivi Rome Italy ISBN 978-3-662-47316-0 DOI

More information

Stem Cell Biology and Regenerative Medicine

Stem Cell Biology and Regenerative Medicine Stem Cell Biology and Regenerative Medicine Series Editor Kursad Turksen, Ph.D. kursadturksen@gmail.com For further volumes: http://www.springer.com/series/7896 Tiziana A.L. Brevini Editor Stem Cells

More information

Collaborative Customer Relationship Management

Collaborative Customer Relationship Management Collaborative Customer Relationship Management Alexander H. Kracklauer D. Quinn Mills Dirk Seifert Editors Collaborative Customer Relationship Management Taking CRM to the Next Level With 99 Figures and

More information

Software Process Automation

Software Process Automation Software Process Automation Alan M. Christie Software Process Automation The Technology and Its Adoption With 48 Figures and 19Tables Springer Alan M. Christie Software Engineering Institute Carnegie Mellon

More information

THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS

THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelee and Bart Preneel COSIC Research Group, Dept. Electrical Engineering-ESAT, Katholieke

More information

Security In Information Systems WOSIS-2005

Security In Information Systems WOSIS-2005 The Third International Workshop on Security In Information Systems WOSIS-2005 http://www.iceis.org/workshops/wosis/wosis2005-cfp.html May 24-25, 2005 Miami, USA First Announcement and Call for Papers

More information

Applying Comparative Effectiveness Data to Medical Decision Making

Applying Comparative Effectiveness Data to Medical Decision Making Applying Comparative Effectiveness Data to Medical Decision Making Carl V. Asche Editor Applying Comparative Effectiveness Data to Medical Decision Making A Practical Guide Adis Editor Carl V. Asche Research

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Statistics for Innovation

Statistics for Innovation Statistics for Innovation Pasquale Erto Editor Statistics for Innovation Statistical Design of Continuous Product Innovation 123 Pasquale Erto Department of Aerospace Engineering University of Naples Federico

More information

Corporate Performance Management

Corporate Performance Management Corporate Performance Management August-Wilhelm Scheer Wolfram Jost Helge Heß Andreas Kronz Editors Corporate Performance Management ARIS in Practice With 145 Figures and 5 Tables 123 Professor Dr. Dr.

More information

The Language Factor in International Business. Linguistic Insights in Language and Communication. Peter Lang

The Language Factor in International Business. Linguistic Insights in Language and Communication. Peter Lang li151 Studies Linguistic Insights in Language and Communication Priscilla Heynderickx, Sylvain Dieltjens, Geert Jacobs, Paul Gillaerts & Elizabeth de Groot (eds) The Language Factor in International Business

More information

The Product Manager s Toolkit

The Product Manager s Toolkit The Product Manager s Toolkit Gabriel Steinhardt The Product Manager s Toolkit Methodologies, Processes and Tasks in High-Tech Product Management ISBN 978-3-642-04507-3 e-isbn 978-3-642-04508-0 DOI 10.1007/978-3-642-04508-0

More information

Handbook of Research. on Social, Economic, and Environmental. Sustainability in the. Development of Smart. Cities

Handbook of Research. on Social, Economic, and Environmental. Sustainability in the. Development of Smart. Cities Handbook of Research on Social, Economic, and Environmental Sustainability in the Development of Smart Cities Andrea Vesco Istituto Superiore Mario Boel/a, Italy Francesco Ferrero Istituto Superiore Mario

More information

Implementation of federated authentication Case study Cesar Pacheco Politecnico di Torino Politecnico di Torino 2-3-4 March 2005 EuroCAMP Working The members come from Departments of Politecnico, ISPs,

More information

New Frontiers in Entrepreneurship

New Frontiers in Entrepreneurship New Frontiers in Entrepreneurship International Studies In Entrepreneurship Series Editors: Zoltan J. Acs Geroge Manson University Fairfox, VA, USA David B. Audretsch Indiana University Bloomington, IN,

More information

THREAT MODELLING FOR ACTIVE DIRECTORY

THREAT MODELLING FOR ACTIVE DIRECTORY THREAT MODELLING FOR ACTIVE DIRECTORY David Chadwick ISI, University of Salford, Salford, M5 4WT, England. Abstract: Key words: This paper analyses the security threats that can arise against an Active

More information

A Secure Intrusion Avoidance System Using Hybrid Cryptography

A Secure Intrusion Avoidance System Using Hybrid Cryptography ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica

SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica SSL VPN Virtual Private Networks based on Secure Socket Layer Mario Baldi Politecnico di Torino Dipartimento di Automatica e Informatica mario.baldi[at]polito.it staff.polito.it/mario.baldi Nota di Copyright

More information

Advances in Spatial Science

Advances in Spatial Science Advances in Spatial Science Editorial Board Manfred M. Fischer Geoffrey J.D. Hewings Anna Nagurney Peter Nijkamp Folke Snickars (Coordinating Editor) For further volumes: http://www.springer.com/series/3302

More information

Springer Geography. For further volumes: http://www.springer.com/series/10180

Springer Geography. For further volumes: http://www.springer.com/series/10180 Springer Geography For further volumes: http://www.springer.com/series/10180 Liliana Bazzanella Luca Caneparo Franco Corsico Giuseppe Roccasalva Editors The Future of Cities and Regions Simulation, Scenario

More information

Challenges and Opportunities in Health Care Management

Challenges and Opportunities in Health Care Management Challenges and Opportunities in Health Care Management . Sebastian Gurtner Katja Soyez Editors Challenges and Opportunities in Health Care Management Editors Sebastian Gurtner Research Group InnoTech4Health

More information

Big-Data Analytics and Cloud Computing

Big-Data Analytics and Cloud Computing Big-Data Analytics and Cloud Computing Marcello Trovati Richard Hill Ashiq Anjum Shao Ying Zhu Lu Liu Editors Big-Data Analytics and Cloud Computing Theory, Algorithms and Applications 123 Editors Marcello

More information

FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM

FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM April 2011 Index Personal details and education 1 Research activities 2 Teaching and tutorial activities 3 Conference organization and review activities

More information

THREAT MODELLING FOR ACTIVE DIRECTORY

THREAT MODELLING FOR ACTIVE DIRECTORY THREAT MODELLING FOR ACTIVE DIRECTORY David Chadwick ISI, University of Salford, Salford, M5 4WT, England. Abstract: Key words: This paper analyses the security threats that can arise against an Active

More information

Miklós Szendrői Franklin H. Sim (Eds.) Color Atlas of Clinical Orthopedics

Miklós Szendrői Franklin H. Sim (Eds.) Color Atlas of Clinical Orthopedics Miklós Szendrői Franklin H. Sim (Eds.) Color Atlas of Clinical Orthopedics Miklós Szendrői Franklin H. Sim (Eds.) Color Atlas of Clinical Orthopedics Miklós Szendrői 1113 Budapest Franklin Sim Mayo Clinic

More information

Cost Management in Shipbuilding

Cost Management in Shipbuilding Cost Management in Shipbuilding Jan O. Fischer Gerd Holbach Cost Management in Shipbuilding Planning, Analysing and Controlling Product Cost in the Maritime Industry GKP Publishing Dr. Jan O. Fischer

More information

The MRI Study Guide for Technologists

The MRI Study Guide for Technologists The MRI Study Guide for Technologists Kenneth S. Meacham The MRI Study Guide for Technologists With 51 Illustrations Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest

More information

SpringerBriefs in Criminology

SpringerBriefs in Criminology SpringerBriefs in Criminology More information about this series at http://www.springer.com/series/10159 Wesley G. Jennings Rolf Loeber Dustin A. Pardini Alex R. Piquero David P. Farrington Offending

More information

Eva-Maria Jakobs and Daniel Perrin (Eds.) Handbook of Writing and Text Production

Eva-Maria Jakobs and Daniel Perrin (Eds.) Handbook of Writing and Text Production Eva-Maria Jakobs and Daniel Perrin (Eds.) Handbook of Writing and Text Production Handbooks of Applied Linguistics Communication Competence Language and Communication Problems Practical Solutions Editors

More information

Network Security Essentials:

Network Security Essentials: Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal

More information

Lecture Notes in Mathematics 2033

Lecture Notes in Mathematics 2033 Lecture Notes in Mathematics 2033 Editors: J.-M. Morel, Cachan B. Teissier, Paris Subseries: École d Été de Probabilités de Saint-Flour For further volumes: http://www.springer.com/series/304 Saint-Flour

More information

Lecture Notes in Mathematics 2108

Lecture Notes in Mathematics 2108 Lecture Notes in Mathematics 2108 Editors-in-Chief: J.-M. Morel, Cachan B. Teissier, Paris Advisory Board: Camillo De Lellis (Zürich) Mario Di Bernardo (Bristol) Alessio Figalli (Austin) Davar Khoshnevisan

More information

Lecture Notes in Mathematics

Lecture Notes in Mathematics Lecture Notes in Mathematics Edited by A. Dold and B. Eckmann Subseries: Fondazione C.I.M.E., Firenze Adviser: Roberto Conti 1337 E. Sernesi (Ed.) Theory of Moduli Lectures given at the 3rd 1985 Session

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

EU SUSTAINABLE ENERGY WEEK 24-28 JUNE 2013

EU SUSTAINABLE ENERGY WEEK 24-28 JUNE 2013 EU SUSTAINABLE ENERGY WEEK 24-28 JUNE 2013 Prof. Anna Osello 25.06.2013 Energy Summary The SEEMPubS project Objectives The demonstrator Methodology Results End user s awareness The DIMMER project Objectives

More information

Lectures for the course: Electronic Commerce Technology (IT 60104)

Lectures for the course: Electronic Commerce Technology (IT 60104) Lectures for the course: Electronic Commerce Technology (IT 60104) Week 1 Lecture 1 30/12/2010 Introduction to the course Evaluation guidelines Week 2 Lecture 2 3/01/2011 Overview of E-Commerce E-Commerce

More information

Studies in the Economics of Uncertainty

Studies in the Economics of Uncertainty Studies in the Economics of Uncertainty Josef Hadar Thomas B. Fomby Tae Kun Sea Editors Studies in the Economics of Uncertainty In Honor of Josef Hadar With 25 Illustrations Springer Verlag New York Berlin

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements

More information

A Robust Multimedia Contents Distribution over IP based Mobile Networks

A Robust Multimedia Contents Distribution over IP based Mobile Networks , pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering

More information

Frank Peter Helmus. Process Plant Design. Project Management from Inquiry to Acceptance. Translated by Christine Ahner

Frank Peter Helmus. Process Plant Design. Project Management from Inquiry to Acceptance. Translated by Christine Ahner Frank Peter Helmus Process Plant Design Project Management from Inquiry to Acceptance Translated by Christine Ahner Frank Peter Helmus Process Plant Design Further Reading Vogel, G. H. Process Development

More information

Supporting Education and Training in the field of Satellite Navigation in Europe. Gabriella Povero. Istituto Superiore Mario Boella

Supporting Education and Training in the field of Satellite Navigation in Europe. Gabriella Povero. Istituto Superiore Mario Boella Supporting Education and Training in the field of Satellite Navigation in Europe Gabriella Povero Istituto Superiore Mario Boella The NavSAS The NavSAS research group is a joint team between Istituto Superiore

More information

Eleventh Hour Security+

Eleventh Hour Security+ Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.

More information

Mobile Market Research

Mobile Market Research Emanuel Maxl / Nicola Döring / Astrid Wallisch (Hrsg.) Mobile Market Research Herbert von Halem Verlag Bibliografische Information der Deutschen Bibliothek Die deutsche Bibliothek verzeichnet diese Publikation

More information

Security for all: network-based protection for personal devices

Security for all: network-based protection for personal devices Security for all: network-based protection for personal devices Antonio Lioy Politecnico di Torino < lioy @ polito.it > Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28/4/2015 Why SECURity at

More information

Complications in Endodontic Surgery

Complications in Endodontic Surgery Complications in Endodontic Surgery Igor Tsesis Editor Complications in Endodontic Surgery Prevention, Identification and Management Editor Igor Tsesis, DMD Department of Endodontology Maurice and Gabriela

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

Interoperability of Learning Object Repositories

Interoperability of Learning Object Repositories Interoperability of Learning Object Repositories Dr. Bernd Simon Wirtschaftsuniversität Wien Contributors Christian Werner, Learning Lab Lower Saxony Erik Duval, Katholieke Universiteit Leuven & Ariadne

More information

Human-Survey Interaction

Human-Survey Interaction Lars Kaczmirek Human-Survey Interaction Usability and Nonresponse in Online Surveys Herbert von Halem Verlag Bibliografische Information der Deutschen Bibliothek Die deutsche Bibliothek verzeichnet diese

More information

Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.

Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac. Video Encryption Exploiting Non-Standard 3D Data Arrangements Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.at Andreas Uhl 1 Carinthia Tech Institute & Salzburg University Outline

More information

Information and Network Security Certificate Program

Information and Network Security Certificate Program Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly

More information

Lecture Notes in Mathematics 2026

Lecture Notes in Mathematics 2026 Lecture Notes in Mathematics 2026 Editors: J.-M. Morel, Cachan B. Teissier, Paris Subseries: École d Été de Probabilités de Saint-Flour For further volumes: http://www.springer.com/series/304 Saint-Flour

More information

Cardiovascular Disease in AIDS

Cardiovascular Disease in AIDS Cardiovascular Disease in AIDS Giuseppe Barbaro - Franck Boccara (Eds) Cardiovascular Disease in AIDS Foreword by W. Rozenbaum 1 3 GIUSEPPE BARBARO Department of Medical Pathophysiology University La Sapienza

More information

Lecture Notes in Artificial Intelligence

Lecture Notes in Artificial Intelligence Lecture Notes in Artificial Intelligence 745 Subseries of Lecture Notes in Computer Science Edited by J. Siekmann Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis V. Roberto (Ed.) Intelligent

More information

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0 PowerKey Conditional Access System Phase 1.0 System Overview Revision 1.0 Scientific-Atlanta, Inc, Unpublished Works of Scientific-Atlanta, Inc. Copyright 1997 Scientific-Atlanta, Inc. All Rights Reserved

More information

Library and Information Sciences

Library and Information Sciences Library and Information Sciences Chuanfu Chen Ronald Larsen Editors Library and Information Sciences Trends and Research Editors Chuanfu Chen School of Information Management Wuhan University Wuhan China

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

More information

Cryptography and Network Security Chapter 1

Cryptography and Network Security Chapter 1 Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood

More information

Representation of E-documents in AIDA Project

Representation of E-documents in AIDA Project Representation of E-documents in AIDA Project Diana Berbecaru Marius Marian Dip. di Automatica e Informatica Politecnico di Torino Corso Duca degli Abruzzi 24, 10129 Torino, Italy Abstract Initially developed

More information

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel

More information

Lecture Notes in Computer Science

Lecture Notes in Computer Science Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 218 Advances in Cryptology CRYPTO '85 Proceedings Ischnbcha Hochsthule FACH8ESEICH INFORMAL LLLLL2 T H E K 6 Scichgebiete:- v..: Edited

More information

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON Introduction to Computer Security International Edition Michael T. Goodrich Department of Computer Science University of California, Irvine Roberto Tamassia Department of Computer Science Brown University

More information

CIS 253. Network Security

CIS 253. Network Security CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum

More information

SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS

SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in

More information

Audio and Video for the Internet

Audio and Video for the Internet RTP Audio and Video for the Internet Colin Perkins TT rvaddison-wesley Boston San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney 'lokyo Singapore Mexico City CONTENTS PREFACE

More information

Cmix solution. CMix Japan Co. Ltd. Copyright (C) 2007 CMix Japan Co. Ltd. All Rights Reserved.

Cmix solution. CMix Japan Co. Ltd. Copyright (C) 2007 CMix Japan Co. Ltd. All Rights Reserved. Cmix solution CMix Japan Co. Ltd. 1 Content & Corporate Profile 1. Birth of Cmix 1-1. Current situation and issues of video piracy 1-2. Cmix business solution 1-3. Cmix system 2. Transition of media cycle

More information

Essential Clinical Social Work Series

Essential Clinical Social Work Series Essential Clinical Social Work Series Series Editor Carol Tosone For further volumes: http://www.springer.com/series/8115 Judith B. Rosenberger Editor Relational Social Work Practice with Diverse Populations

More information

TC-11 Security and Privacy Protection in Information Processing Systems. Factsheet WG 11.12 Human Aspects of Information Security and Assurance

TC-11 Security and Privacy Protection in Information Processing Systems. Factsheet WG 11.12 Human Aspects of Information Security and Assurance International Federation for Information Processing TC-11 Security and Privacy Protection in Information Processing Systems Factsheet WG 11.12 Human Aspects of Information Security and Assurance Version:

More information

More information about this series at http://www.springer.com/series/4622

More information about this series at http://www.springer.com/series/4622 Power Systems More information about this series at http://www.springer.com/series/4622 Siddhartha Kumar Khaitan James D. McCalley Chen-Ching Liu Editors Cyber Physical Systems Approach to Smart Electric

More information

List of Projects in Application

List of Projects in Application List of Projects in Application S-Logix #9, First Floor, Krishnabai St, Habibullah Road T.Nagar, Chennai-600017 (Opp:HDFC Bank) Ph:28343467 Mobile: 8124001111, 9710999001 E-Mail: slogix.india@gmail.com

More information

Introducing Honeycomb. An Open Source Release Automation Solution for Be Informed

Introducing Honeycomb. An Open Source Release Automation Solution for Be Informed Introducing Honeycomb An Open Source Release Automation Solution for Be Informed Copyrighted Material Introducing Honeycomb: An Open Source Release Automation Solution for Be Informed A Taxonic technical

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

How to Send Video Images Through Internet

How to Send Video Images Through Internet Transmitting Video Images in XML Web Service Francisco Prieto, Antonio J. Sierra, María Carrión García Departamento de Ingeniería de Sistemas y Automática Área de Ingeniería Telemática Escuela Superior

More information

Privacy and Identity Management for Europe

Privacy and Identity Management for Europe Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information

More information

Springer Proceedings in Mathematics & Statistics

Springer Proceedings in Mathematics & Statistics Springer Proceedings in Mathematics & Statistics Volume 135 More information about this series at http://www.springer.com/series/10533 Springer Proceedings in Mathematics & Statistics This book series

More information

CcMS: A Cloud Computing Based Content Management System

CcMS: A Cloud Computing Based Content Management System International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 4 (2013), pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm CcMS:

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Improving Quality Assurance in European Vocational Education and Training

Improving Quality Assurance in European Vocational Education and Training Improving Quality Assurance in European Vocational Education and Training Adrie J. Visscher Editor Improving Quality Assurance in European Vocational Education and Training Factors Influencing the Use

More information

Global Logistics Management

Global Logistics Management Global Logistics Management Sustainability, Quality, Risks Edited by Wolfgang Kersten, Thorsten Blecker, and Heike Flämig With Contributions by Adel Al-Mansi, Hatem Aldarrat, Dagoberto Alves de Almeida,

More information